Main content

Module 2, Part 1: Introduction

Menu

Loading wiki pages...

View
Wiki Version:
# Module 2: Introduction # Summary This module is an introduction to the topic of data security. Data need to be of integrity, available, and confidential to be of value (CIA triad). In addition, they often need to be of utility, possession, and authenticity. # Learning Goals - Learn under which circumstances data security is given - Know the different methods how data security is obtained # Table of Contents - [Access Control](https://osf.io/qukj4/wiki/Module%202%2C%20Part%202:%20Access%20Control/) - [Cryptography](https://osf.io/qukj4/wiki/Module%202%2C%20Part%204:%20Cryptography/) - [Data Integrity](https://osf.io/qukj4/wiki/Module%202%2C%20Part%203:%20Data%20Integrity/) # Presentation Slides Example presentation slides for this module can be found [here](https://osf.io/7p58w).
OSF does not support the use of Internet Explorer. For optimal performance, please switch to another browser.
Accept
This website relies on cookies to help provide a better user experience. By clicking Accept or continuing to use the site, you agree. For more information, see our Privacy Policy and information on cookie use.
Accept
×

Start managing your projects on the OSF today.

Free and easy to use, the Open Science Framework supports the entire research lifecycle: planning, execution, reporting, archiving, and discovery.